• Skip to primary navigation
  • Skip to main content

American Cyber Security Management

Secure and certify all your data and processes

  • LinkedIn
  • Twitter
  • YouTube
  • Services
    • MSP/MSSP
    • Privacy
    • Security
    • ISO/IEC 27001:2022 Training & Certification
    • Secure DevOps
    • InfoSec Risk Management
    • Incident Response Planning
    • Artificial intelligence Readiness Offering
    • AppSec-as-a-Service
    • CISO As A Service
    • DPO As A Service
    • Security Monitoring
    • Security Operations
    • Awareness Training
  • Frameworks
    • CPA
    • CCPA/CPRA
    • GDPR
    • ISO 27001:2022
    • NIST 800-171
    • NIST 800-53
    • US Privacy Laws
  • News
  • Careers
    • DPO
    • CISO
  • Partners
  • About Us
    • Privacy Notice
    • Cookie Policy
  • Contact Us

Choosing your MSP/MSSP Services

October 8, 2025 By Carlin Dornbusch

Now that you have decided to use an MSP/MSSP, more detailed thoughts can be put towards “dialing-in” your specific MSP/MSSP services. We have found an easy way to break down this vast area of services is to think about a pancake layer of Infrastructure, IT, Security, Strategy and then Compliance. At ACSM we call this a Secure Information Technology Environment (S.I.T.E). We then look at each area and break them down into sub-components. This allows the IT leader to think through their specific needs more easily. You can see a diagram of these areas and our breakdown here: https://www.americancsm.com/acsm-s-i-t-e-msp-mssp-services/

Areas of Consideration as you look across the pancake layers:

  • What unique and specific needs of IT do you have now?
  • Do you have enough security? Are you considering all of your threats?
  • Look at Backup and Recovery and Ransomware Protection
  • How much Compliance Support do you need?
  • Focus on Resiliency for critical solutions
  • Use the lens of Incident Management when looking at your architecture

Here at ACSM we can help you define your proper architecture and cut through a lot of the vendor hype in the market. Our strategic consulting can help you save time and money, as well as build resilient and highly secured environments.

How ACSM helps with its S.I.T.E. Offering:

  • Fast Migration and Adoption
  • Strategic Alignment and Communications
  • Risk Quantification and Mitigation
  • Reduced overall IT spend
  • 3rd Party Support
  • Meet Compliance levels

AmericanCSM.com helps its clients by outlining a Secure IT Environment (S.I.T.E.), where a variety of services can be selectively engaged to meet your specific business needs. You can read more about our MSP/MSSP offerings here https://www.americancsm.com/acsm-s-i-t-e-msp-mssp-services/ 

ACSM has been helping businesses protect their assets and improve their security and privacy posture since 2006. Our skilled team can help your business understand its cyber weaknesses and potential threats as well as improve your security, privacy, and compliance postures. Our services include penetration testing, maturity assessments, cyber security, and privacy implementation assistance, CISO-as-a-Service, DPO-as-a-Service, and numerous MSP and MSSP services, to mention a few.

To learn more about how ACSM can help support your cyber defense needs, please use our contact page https://www.americancsm.com/contact-us/ and schedule a free consultation call today.

Filed Under: Cyber Security News

CCPA Risk Assessment

September 23, 2025 By Carlin Dornbusch

Are you ready for the new audits and assessments that the California Privacy Protection Agency (“CPPA”) require? In July 2025, the CPPA updated the California Consumer Privacy Act (CCPA”) to require businesses to perform Risk Assessments and Cybersecurity Audits. The Risk Assessments apply to businesses that are selling or sharing information, using automated decision-making technology (“ADMT”) to make significant decisions or to infer personal attributes, or using Personal Information to train ADMT.

The annual Security Audits should cover the following areas that support Personal Information:

  • User Authentication
  • Encryption
  • Access Controls
  • Inventory management
  • Secure Hardware and Software Configurations
  • Network Segmentation
  • Network Monitoring and Defense
  • Penetration Testing and Vulnerability Management
  • Audit log Management
  • Data Retention and Data Disposal
  • Anti-virus, anti-malware Protection
  • Incident Response

Once again, the CPPA is concerned about how businesses handle data and will now be enforcing these new controls of CCPA on December 31, 2027, and April 1, 2028, respectively. (There are specific deadlines for the Cybersecurity Audits that depend on the business revenue size, with smaller businesses having until April 1, 2030 to meet compliance.)

Your privacy assessments or data mappings should show the business what data is being sold or shared, in order to help prepare you for your targeted risk assessments and the required cybersecurity audits. So be sure to have these artifacts completed before beginning the newly required Risk Assessments or Security Audits.

ACSM has been helping businesses protect their assets and improve their security and privacy posture since 2006. Our skilled team can help your business understand its cyber weaknesses and potential threats as well as improve your security, privacy, and compliance postures. Our services include penetration testing, maturity assessments, cyber security, and privacy implementation assistance, CISO-as-a-Service, DPO-as-a-Service, and numerous MSP and MSSP services, to mention a few.

To learn more about how ACSM can help support your cyber defense needs, please use our contact page https://www.americancsm.com/contact-us/ and schedule a free consultation call today.

Filed Under: Cyber Security News

How best to choose a MSP/MSSP?

August 27, 2025 By Carlin Dornbusch

Why use an MSP or MSSP?

Outsourcing your IT and Security functions can be intimidating the first time. Most folks are fearful of losing control or unsure how to manage the transition. At AmericanCSM.com we help our clients in this transition, so that maximum operational gains and lowest financial impact can be realized. Below are some benefits and considerations for choosing an MSP/MSSP.

Immediate and Long-term values of using an MSP/MSSP

  • Cost Effective
  • Easily Managed
  • Compliance Supporting
  • Just-in Time Expertise

With a flat monthly fee, your IT management can be more predictable and not need larger investments for hardware and software. Your IT environment can now be managed by fewer internal resources, while the MSP handles all the mundane tasks of patching, monitoring and change management for you. You might even be able to accelerate getting to a specific level of compliance like HIPAA, SOC2, or even ISO-27001, than if you were doing it all yourself. The skill sets needed to manage most environments is broad, with a deep understanding of a variety of security and compliance issues. The MSP/MSSP services allow you to engage specialized resources in a just-in-time model so that you can focus on your business and not the management of specialized staff.

AmericanCSM.com helps its clients by outlining a Secure IT Environment (S.I.T.E.), where a variety of services can be selectively engaged to meet your specific business needs. You can read more about our MSP/MSSP offerings here https://www.americancsm.com/acsm-s-i-t-e-msp-mssp-services/ We can set up an initial discovery meeting to help you map these services to your needs and deliver quick quoting to demonstrate the values of the MSP/MSSP.

ACSM has been helping businesses protect their assets and improve their security and privacy posture since 2006. Our skilled team can help your business understand its cyber weaknesses and potential threats as well as improve your security, privacy, and compliance postures. Our services include penetration testing, maturity assessments, cyber security, and privacy implementation assistance, CISO-as-a-Service, DPO-as-a-Service, and numerous MSP and MSSP services, to mention a few.

To learn more about how ACSM can help support your cyber defense needs, please use our contact page https://www.americancsm.com/contact-us/ and schedule a free consultation call today.

Filed Under: Cyber Security News

Why use an MSP/MSSP?

August 6, 2025 By Carlin Dornbusch

Outsourcing your IT and Security functions can be intimidating the first time. Most folks are fearful of losing control or unsure how to manage the transition. At AmericanCSM.com we help our clients in this transition, so that maximum operational gains and lowest financial impact can be realized. Below are some benefits and considerations for choosing an MSP/MSSP.

Immediate and Long-term values of using an MSP/MSSP

  • Cost Effective
  • Easily Managed
  • Compliance Supporting
  • Just-in Time Expertise

With a flat monthly fee, your IT management can be more predictable and not need larger investments for hardware and software. Your IT environment can now be managed by fewer internal resources, while the MSP handles all the mundane tasks of patching, monitoring and change management for you. You might even be able to accelerate getting to a specific level of compliance like HIPAA, SOC2, or even ISO-27001, than if you were doing it all yourself. The skill sets needed to manage most environments is broad, with a deep understanding of a variety of security and compliance issues. The MSP/MSSP services allow you to engage specialized resources in a just-in-time model so that you can focus on your business and not the management of specialized staff.

AmericanCSM.com helps its clients by outlining a Secure IT Environment (S.I.T.E.), where a variety of services can be selectively engaged to meet your specific business needs. You can read more about our MSP/MSSP offerings here https://www.americancsm.com/acsm-s-i-t-e-msp-mssp-services/ We can set up an initial discovery meeting to help you map these services to your needs and deliver quick quoting to demonstrate the values of the MSP/MSSP.

ACSM has been helping businesses protect their assets and improve their security and privacy posture since 2006. Our skilled team can help your business understand its cyber weaknesses and potential threats as well as improve your security, privacy, and compliance postures. Our services include penetration testing, maturity assessments, cyber security, and privacy implementation assistance, CISO-as-a-Service, DPO-as-a-Service, and numerous MSP and MSSP services, to mention a few.

To learn more about how ACSM can help support your cyber defense needs, please use our contact page https://www.americancsm.com/contact-us/ and schedule a free consultation call today.

Filed Under: Cyber Security News

ACSM Announces MSP/MSSP Offerings

July 23, 2025 By Carlin Dornbusch

American Cyber Security Management (AmericanCSM.com) is proud to announce its MSP and MSSP offerings. While ACSM has been recognized for its leadership in Cybersecurity and Privacy for nearly 20 years, it is now time to announce its new service offerings, which complete its vision and meet the needs of its customers for fully managed IT and Security services. ACSM’s S.I.T.E. (Secure Information Technology Environment) is the comprehensive suite of IT and Security services that enables ACSM customers to achieve nearly any level of compliance.

Immediate value of ACSM’s S.I.T.E.

  • Cost Effective
  • Easily Managed
  • Compliance Supporting
  • Faster Time to Revenue

Not only are ACSM’s S.I.T.E. services in alignment with MSP/MSSP costs, it allows businesses to focus on their core business and directly support the revenue cycle.

What to look for in a fully managed IT and Secure environment leader:

  • Experience
  • Qualifications
  • Certifications
  • Leadership and Culture Fit
  • Flexibility

S.I.T.E. meets all of the needs for your IT and Security environment and additionally offers the IT and Cybersecurity leadership needed to stay ahead of new technologies and emerging threats.

How ACSM helps with its S.I.T.E. Offering

  • Fast Migration and Adoption
  • Strategic Alignment and Communications
  • Risk Quantification and Mitigation
  • Reduced overall IT spend
  • 3rd Party Support
  • Meet Compliance levels

ACSM’s initial assessment will recommend migration costs as well as gap-filling remediation services to ensure your IT environment meets the best security measures.

ACSM has been helping businesses protect their assets and improve their security and privacy posture since 2006. Our skilled team can help your business identify its cyber weaknesses and potential threats, as well as enhance your security, privacy, and compliance postures. Our services include penetration testing, maturity assessments, cybersecurity and privacy implementation assistance, CISO-as-a-Service, DPO-as-a-Service, and numerous MSP and MSSP services, among others.

To learn more about how ACSM can support your cyber defense needs, please visit our contact page at https://www.americancsm.com/contact-us/ and schedule a free consultation call today.

Filed Under: Cyber Security News

  • Page 1
  • Page 2
  • Page 3
  • Interim pages omitted …
  • Page 24
  • Go to Next Page »
  • ISSA
  • ISACA
  • ISC2
  • IAPP
  • CSA
  • CIS
  • Privacy Notice
  • Cookie Policy
  • Services
  • Frameworks
  • News
  • Careers
  • Partners
  • About Us
  • Contact Us

Copyright © 2025 American Cyber Security Management